Date


People

Download Available

Library Of Congress

Dewey Decimal

2252 results

Response to risk: experts and end-user perspectives on email security, and the role of the business information professional in policy development

Journal Article
Kelleher, Z., & Hall, H. (2005)
Response to risk: experts and end-user perspectives on email security, and the role of the business information professional in policy development. Business Information Review, 22(1), 46-52. https://doi.org/10.1177/0266382105052266
This article considers the main sources of e-mail security risk, and means of addressing it with particular reference to the creation and deployment of e-mail security policie...

A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment

Journal Article
Babar, M., Khan, F., Iqbal, . W., Yahya, A., Arif, F., Tan, Z., & Chuma, J. (2018)
A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment. IEEE Access, 6, 43088-43099
Smart societies have an increasing demand for quality-oriented services and infrastructure in an Industrial Internet of Things (IIoT) paradigm. Smart urbanization faces numero...

Granular Data Access Control with a Patient-Centric Policy Update for Healthcare

Journal Article
Khan, F., Khan, S., Tahir, S., Ahmad, J., Tahir, H., & Shah, S. A. (2021)
Granular Data Access Control with a Patient-Centric Policy Update for Healthcare. Sensors, 21(10), https://doi.org/10.3390/s21103556
Healthcare is a multi-actor environment that requires independent actors to have a different view of the same data, hence leading to different access rights. Ciphertext Policy...

Prediction of Critical Flashover Voltage of High Voltage Insulators Leveraging Bootstrap Neural Network

Journal Article
Niazi, M. T. K., Arshad, , Ahmad, J., Alqahtani, F., Baotham, F. A., & Abu-Amara, F. (2020)
Prediction of Critical Flashover Voltage of High Voltage Insulators Leveraging Bootstrap Neural Network. Electronics, 9(10), https://doi.org/10.3390/electronics9101620
Understanding the flashover performance of the outdoor high voltage insulator has been in the interest of many researchers recently. Various studies have been performed to inv...

Mastering Computing.

Book
Buchanan, W. J. (2001)
Mastering Computing. Macmillan Press
Computing is an area which continues to grow. This book covers the main areas of computing, including programming, computer hardware, operating systems, the Internet, data com...

New role realities: Avenues for extending the reach of information specialists

Journal Article
Hall, H., & Abell, A. (2006)
New role realities: Avenues for extending the reach of information specialists. Proceedings of the American Society for Information Science and Technology, 43(1), 1-13. https://doi.org/10.1002/meet.14504301267
As organizations have developed enterprise-wide electronic information environments, a diverse range of job roles has emerged at a variety of levels. Some of these roles are e...

Scientific names are ambiguous as identifiers for biological taxa: their context and definition are required for accurate data integration

Conference Proceeding
Kennedy, J., Kukla, R., & Paterson, T. (2005)
Scientific names are ambiguous as identifiers for biological taxa: their context and definition are required for accurate data integration. In B. Ludaescher, & L. Raschid (Eds.), Data Integration in the Life Sciences, 80-95. https://doi.org/10.1007/11530084_8
Biologists use scientific names to label the organisms described in their data; however, these names are not unique identifiers for taxonomic entities. Alternative taxonomic c...

A generative and component based approach to reuse in database applications.

Conference Proceeding
Wang, B. H. (., Liu, X., & Kerridge, J. (2002)
A generative and component based approach to reuse in database applications. In 5th Generative Programming and Component Engineering Young Researcher Workshop
The development of database application systems will benefit from high reusability because similar design circumstances recur frequently in database developments. However, res...

An assessment of data leakage in Firefox under different conditions.

Presentation / Conference
Findlay, C., & Leimich, P. (2014, July)
An assessment of data leakage in Firefox under different conditions. Paper presented at CFET 2014: 7th International Conference on Cybercrime Forensics Education & Training, Christ Church,
Data leakage is a serious issue and can result in the loss of sensitive data, compromising user accounts and details, potentially affecting millions of internet users. This pa...

A hyper-heuristic ensemble method for static job-shop scheduling.

Journal Article
Hart, E., & Sim, K. (2016)
A hyper-heuristic ensemble method for static job-shop scheduling. Evolutionary Computation, 24(4), 609-635. https://doi.org/10.1162/EVCO_a_00183
We describe a new hyper-heuristic method NELLI-GP for solving job-shop scheduling problems (JSSP) that evolves an ensemble of heuristics. The ensemble adopts a divide-and-conq...

Date


Date


Date


Date